In this blog post, we will be solving another challenge designed by Cyber Defenders using the full version of ArtiFast Windows. In this case, an attacker has compromised an organization’s web server through their website. The purpose of this challenge is to analyze the image provided and specify how the breach occurred and to identify the actions/commands performed by the attacker (scenario). Below is the solution to the challenge, solved using ArtiFast.
The answer can be found in Computer Name artifact under the Registry category. The computer name is WIN-L0ZZQ76PMUF
The answer can be found in Timezone Information artifact under the Registry category. The computer timezone is UTC-7.
The answer can be found in System Information artifact under the Registry category. The current build is 6001.
The answer can be found in User Accounts artifact under the Registry category. There are 4 users on the compromised machine.
The answer can be found in UserAssist artifact under the Registry category. XAMPP package was installed on the machine.
There are multiple ways to figure out the vulnerable web app installed on the webserver. Either through Shellbags artifact under the Registry category or through Internet Explorer Daily History artifact under the Web Activity category.
The answer can also be found in Internet Explorer Daily History artifact under the Web Activity category.
The answer can be found by following the steps below: